2.3 Test Server Connection Signature Validation
Here is the professionally formatted section for 2.3 – Test Server Connection Signature Validation:
2.3 Test Server Connection Signature Validation
Requirement Description
Verify that the firmware applications validate the digital signature of server connections, ensuring authenticity and integrity of server-side data during communication.
DUT Confirmation Details
(To be filled based on OEM-provided inputs, e.g., model name, ID, manufacturer confirmation statements)
DUT Software Details
(To be filled based on OS/firmware version, application modules, and related packages)
Hash Checksum Verification for DUT’s Software Image
(Include SHA256/SHA512 hash verification value here)
DUT Configuration
(Brief description of network configuration, authentication settings, TLS stack, firewall policies etc.)
Pre-Conditions
The vendor shall provide the following documentation:
A detailed use-case document specifying instances where the DUT establishes outbound server connections.
A description of digital signature validation mechanisms (e.g., certificate pinning, mutual TLS, HMAC validation).
Any security controls or APIs implemented to handle signature verification during server communication.
Test Plan Overview
Test Case ID
Test Name
BIS-2.3.1
TC_VALIDATE_SIGNATURE_VALID
BIS-2.3.2
TC_VALIDATE_SIGNATURE_INVALID
BIS-2.3.3
TC_VALIDATE_SIGNATURE_EXPIRED
BIS-2.3.4
TC_VALIDATE_SIGNATURE_MISSING
BIS-2.3.5
TC_VALIDATE_SIGNATURE_ON_SERVER_RESPONSE_CONTENT
Test-bed Diagram with Interfaces and IPs
(Provide a network diagram indicating DUT, test server, MITM/Intercept tools, signature manipulation tools, IPs/subnets used in testing.)
Last updated
Was this helpful?